Networks

Question

How was someone else able to control a library computer?

I broke off a romance with a tech geek who turned out to have unsavory connections. Initially he stalked me solo (I think), but somehow eventually got others to participate. Sounds implausible, but it happened and I have witnesses. QUESTION: During 2006 I repeatedly had this experience: I'd go to the library and begin to use a computer. All would be fine, but after a short time one of these proxy stalkers would show up, plant himself behind me, and start texting. Very quickly I'd lose control and/or access on that computer. I learned to beat the game, sort of, by suddenly running to a random computer, typing in an address I'd copied, and printing immediately. This was the only way to get any information on anything that might help me. A couple of times the thing I was reading disappeared,the screen and text changed color, and I was suddenly reading hostile messages like, "There's nothing for you here. Move along". (This when I'd found an article on rootkits in a journal for librarians.) Generally I don't share this bizarre story with people, because I know they'll be at least skeptical. But this stuff ACTUALLY HAPPENED, and I'd be grateful if you could help me understand HOW. Thanks in advance.

All Answers

TechRepublic members do not aid system/password cracking

TR members do not assist in password recovery or removal. Do not respond to this thread.

We, the members of TechRepublic - A Resource for IT Professionals, will not assist anyone in the recovery/removal of lost passwords. You may have a legitimate reason to recover/remove a password. However, we cannot verify your motives and will therefore not assist anyone in what may be an attempt at gaining unauthorized access to a computer system. Due to the open nature of this forum, any assistance given to help circumvent security measures, even for legitimate purposes, would be available for unscrupulous individuals to use for illegitimate purposes. This is a risk that we, the members of TechRepublic, will not take. Please do not ask questions of this nature on TechRepublic.

If you have a legitimate need to circumvent a password scheme, please contact the vendor for the software / hardware and request their assistance. E.g. Windows XP password recovery/removal issues should be taken up with Microsoft's technical support, Phoenix BIOS password recovery/removal issues should be taken up with Phoenix Technologies, hard drive password recovery/removal should be taken up with the manufacturer of the hard drive, etc...

To those viewing this post: Please DO NOT respond any further to this thread.

This template has been released under the GNU public license and you are encouraged to use it as a standard reply for questions of similar nature, provided that you make any modifications available to other users.

Reponse To Answer

No, gechurch, my reply will stand...the OP is asking how to break the security at the library's computer system...not "password" specifically, but system security none the less. If the OP cannot or will not use a search engine, of which there are several, to find the information then it is not upon TR members to show them how to crack system security. The other issue I have, they asked this same basic question twice.Even ignoring the paranoid delusional aspects of this "question", it has a smell of the darkside of system cracking. That is something that the majority of TR members have decided NOT to assist.Wizard57MTR Moderator

Reponse To Answer

Wizard if you would like to bring down the whip on suggestions to hack, than go after Slayer. He made a post that says word for word "Since it was originally posted on TR, it should be ok. If the Library has open wireless. Download firesheep for firefox and use it to monitor the network. Then steal your stalkers login credentials and mess with them for a bit." and a comment saying word for word "This whole thread is getting funny. Hack that library computer. Just like that girl in school, everyone has already done it at least once". Ps: Please remember I am not attempting to engage in a flame war with any one.

Reponse To Answer

As Moderator's, we still do not have the ability to lock a discussion; that is passed on to higher powers. We have to ability to flag and delete a discussion is need be; some discussions are flagged and passed onto others that make the decision on whether or not to lock it down.

Start or search

Create a new discussion

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

Post type

Subject title

Topic Tags

Select up to 3 tags (1 tag required)

Cloud

Piracy

Security

Apple

Microsoft

IT Employment

Google

Open Source

Mobility

Social Enterprise

Community

Smartphones

Operating Systems

Windows

Mac

Malware

Tablets

Networking

Browser

Hardware

Software

Web Developerment

Linux

Off Topic

Message Body

Track this discussion and email me when there are updates

Please note: Do not post advertisements, offensive material, profanity, or personal attacks. Please remember to be considerate of other members. If you're new to the TechRepublic Forums, please read our TechRepublic Forums FAQ. All submitted content is subject to our Terms Of Use.